ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzaj3_5.4.0.1/rzaj3security.htm

54 lines
3.2 KiB
HTML
Raw Normal View History

2024-04-02 14:02:31 +00:00
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="copyright" content="(C) Copyright IBM Corporation 2005" />
<meta name="DC.rights.owner" content="(C) Copyright IBM Corporation 2005" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="reference" />
<meta name="DC.Title" content="Application Administration as a security tool" />
<meta name="abstract" content="Do not use Application Administration as a security tool." />
<meta name="description" content="Do not use Application Administration as a security tool." />
<meta name="DC.Relation" scheme="URI" content="rzaj3concepts.htm" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="security" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>Application Administration as a security tool</title>
</head>
<body id="security"><a name="security"><!-- --></a>
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">Application Administration as a security tool</h1>
<div><p>Do not use Application Administration as a security tool.</p>
<div class="section"><p> Application Administration was designed for customizing the functions
available on your client PC. You should not use Application Administration
for administering security on your client PC for these reasons: </p>
<ul><li>Application Administration uses the Windows<sup>®</sup> registry to cache restrictions
on the client PC. A skilled user who is restricted from a function by Application
Administration could obtain access to the function by editing the registry.</li>
<li>If multiple interfaces exist to the same resource, restricting a single
interface through Application Administration does not restrict the other interfaces
to the same resource. For example, you can restrict a user from accessing
the database function of iSeries™ Navigator through Application Administration.
However, the user can still access database files by using other database
interfaces, such as Open Database Connectivity (ODBC) or database control
language (CL) commands.</li>
</ul>
</div>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzaj3concepts.htm" title="Before you begin working with Application Administration, you should become familiar with some concepts.">Application Administration concepts</a></div>
</div>
</div>
</body>
</html>